CVE-2025-43743

4.3 MEDIUM

📋 TL;DR

This vulnerability in Liferay Portal and DXP allows any authenticated user to enumerate other users' names by viewing their calendars. This information disclosure could enable targeted phishing attacks against those users. Affected versions include Liferay Portal 7.4.0-7.4.3.132 and multiple DXP versions from 2024.Q1 through 2025.Q1.

💻 Affected Systems

Products:
  • Liferay Portal
  • Liferay DXP
Versions: Liferay Portal 7.4.0 through 7.4.3.132; Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, and 7.4 GA through update 92
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability requires authenticated access but no special privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could harvest all user names from the system and launch sophisticated targeted phishing campaigns, potentially leading to credential theft or further system compromise.

🟠

Likely Case

Authenticated attackers gather limited user information for targeted phishing attempts against specific individuals or departments.

🟢

If Mitigated

With proper access controls and user awareness training, impact is limited to information disclosure without escalation to system compromise.

🌐 Internet-Facing: MEDIUM - Internet-facing instances allow external authenticated attackers to exploit this vulnerability, but exploitation requires valid credentials.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can still exploit this to gather user information for social engineering attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. The vulnerability allows enumeration through calendar viewing functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest security fix pack for your version. For Portal: 7.4.3.133 or later. For DXP: apply the latest fix pack for your specific version.

Vendor Advisory: https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43743

Restart Required: No

Instructions:

1. Download the appropriate fix pack from Liferay's customer portal. 2. Apply the fix pack following Liferay's deployment procedures. 3. Verify the fix by testing calendar access controls.

🔧 Temporary Workarounds

Restrict Calendar Permissions

all

Temporarily restrict calendar viewing permissions to prevent user enumeration.

Navigate to Control Panel > Users and Organizations > Roles > Define Permissions > Calendar > View and restrict to specific roles

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual calendar access patterns
  • Enhance user awareness training about phishing risks and implement email security controls

🔍 How to Verify

Check if Vulnerable:

Test with two authenticated accounts: attempt to view another user's calendar through the interface or API calls to see if user names are exposed.

Check Version:

Check Liferay version via Control Panel > Server Administration > Properties > liferay.version

Verify Fix Applied:

After patching, repeat the test to confirm authenticated users can no longer enumerate other users through calendar functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple calendar view requests from single user to different user IDs
  • Unusual pattern of calendar API calls

Network Indicators:

  • Repeated requests to calendar endpoints with different user parameters

SIEM Query:

source="liferay" AND (uri_path="/api/jsonws/calendar*" OR uri_path="/web/guest/calendar*") AND user_agent!="bot" | stats count by src_ip, user_id

🔗 References

📤 Share & Export